Author: markt
Date: Mon Apr 27 20:13:05 2015
New Revision: 1676364
URL: http://svn.apache.org/r1676364
Log:
Fix https://bz.apache.org/bugzilla/show_bug.cgi?id=57856
Ensure that any scheme/port changes implemented by the RemoteIpFilter also
affect HttpServletResponse.sendRedirect()
Modified:
tomcat/trunk/java/org/apache/catalina/filters/LocalStrings.properties
tomcat/trunk/java/org/apache/catalina/filters/RemoteIpFilter.java
tomcat/trunk/test/org/apache/catalina/connector/TesterResponse.java
tomcat/trunk/test/org/apache/catalina/filters/TestRemoteIpFilter.java
Modified: tomcat/trunk/java/org/apache/catalina/filters/LocalStrings.properties
URL:
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/catalina/filters/LocalStrings.properties?rev=1676364&r1=1676363&r2=1676364&view=diff
==============================================================================
--- tomcat/trunk/java/org/apache/catalina/filters/LocalStrings.properties
(original)
+++ tomcat/trunk/java/org/apache/catalina/filters/LocalStrings.properties Mon
Apr 27 20:13:05 2015
@@ -40,3 +40,4 @@ expiresFilter.filterInitialized=Filter i
expiresFilter.expirationHeaderAlreadyDefined=Request "{0}" with response
status "{1}" content-type "{2}", expiration header already defined
expiresFilter.skippedStatusCode=Request "{0}" with response status "{1}"
content-type "{1}", skip expiration header generation for given status
+remoteIpFilter.invalidLocation=Failed to modify the rewrite location [{0}] to
use scheme [{1}] and port [{2}]
\ No newline at end of file
Modified: tomcat/trunk/java/org/apache/catalina/filters/RemoteIpFilter.java
URL:
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/catalina/filters/RemoteIpFilter.java?rev=1676364&r1=1676363&r2=1676364&view=diff
==============================================================================
--- tomcat/trunk/java/org/apache/catalina/filters/RemoteIpFilter.java (original)
+++ tomcat/trunk/java/org/apache/catalina/filters/RemoteIpFilter.java Mon Apr
27 20:13:05 2015
@@ -17,6 +17,8 @@
package org.apache.catalina.filters;
import java.io.IOException;
+import java.net.URI;
+import java.net.URISyntaxException;
import java.text.DateFormat;
import java.text.SimpleDateFormat;
import java.util.Arrays;
@@ -40,11 +42,13 @@ import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletRequestWrapper;
import javax.servlet.http.HttpServletResponse;
+import javax.servlet.http.HttpServletResponseWrapper;
import org.apache.catalina.AccessLog;
import org.apache.catalina.Globals;
import org.apache.juli.logging.Log;
import org.apache.juli.logging.LogFactory;
+import org.apache.tomcat.util.res.StringManager;
/**
* <p>
@@ -617,6 +621,49 @@ public class RemoteIpFilter implements F
}
}
+ public static class XForwardedResponse extends HttpServletResponseWrapper {
+
+ private final String scheme;
+ private final int port;
+
+ public XForwardedResponse(HttpServletResponse response, String scheme,
int port) {
+ super(response);
+ this.scheme = scheme;
+ if ("http".equals(scheme) && port == 80 || "https".equals(scheme)
&& port == 443) {
+ this.port = -1;
+ } else {
+ this.port = port;
+ }
+ }
+
+ @Override
+ public void sendRedirect(String location) throws IOException {
+ /*
+ * This isn't particularly pretty but, given that:
+ * a) there is no setRequest() method on ServletResponse (even if
+ * there were the response could still access this information
+ * via some internal structure for speed); and
+ * b) that this is meant to work on any Servlet container;
+ * this was the cleanest way I could come up with for doing this.
+ */
+ super.sendRedirect(location);
+ String redirect = getHeader("location");
+ URI newRedirectURI;
+ try {
+ URI redirectURI = new URI(redirect);
+ newRedirectURI = new URI(scheme, redirectURI.getUserInfo(),
+ redirectURI.getHost(), port, redirectURI.getPath(),
+ redirectURI.getQuery(), redirectURI.getFragment());
+ } catch (URISyntaxException e) {
+ log.warn(sm.getString("remoteIpFilter.invalidLocation",
+ location, scheme, Integer.toString(port)));
+ return;
+ }
+ reset();
+ super.sendRedirect(newRedirectURI.toString());
+ }
+ }
+
/**
* {@link Pattern} for a comma delimited string that support whitespace
characters
*/
@@ -632,6 +679,7 @@ public class RemoteIpFilter implements F
* Logger
*/
private static final Log log = LogFactory.getLog(RemoteIpFilter.class);
+ private static final StringManager sm =
StringManager.getManager(RemoteIpFilter.class);
protected static final String PROTOCOL_HEADER_PARAMETER = "protocolHeader";
@@ -810,6 +858,14 @@ public class RemoteIpFilter implements F
}
}
+ HttpServletResponse xResponse;
+ if (xRequest.getScheme() != request.getScheme() ||
+ xRequest.getServerPort() != request.getServerPort()) {
+ xResponse = new XForwardedResponse(response,
xRequest.getScheme(), xRequest.getServerPort());
+ } else {
+ xResponse = response;
+ }
+
if (log.isDebugEnabled()) {
log.debug("Incoming request " + request.getRequestURI() + "
with originalRemoteAddr '" + request.getRemoteAddr()
+ "', originalRemoteHost='" + request.getRemoteHost()
+ "', originalSecure='" + request.isSecure()
@@ -832,7 +888,7 @@ public class RemoteIpFilter implements F
request.setAttribute(AccessLog.SERVER_PORT_ATTRIBUTE,
Integer.valueOf(xRequest.getServerPort()));
}
- chain.doFilter(xRequest, response);
+ chain.doFilter(xRequest, xResponse);
} else {
if (log.isDebugEnabled()) {
log.debug("Skip RemoteIpFilter for request " +
request.getRequestURI() + " with originalRemoteAddr '"
Modified: tomcat/trunk/test/org/apache/catalina/connector/TesterResponse.java
URL:
http://svn.apache.org/viewvc/tomcat/trunk/test/org/apache/catalina/connector/TesterResponse.java?rev=1676364&r1=1676363&r2=1676364&view=diff
==============================================================================
--- tomcat/trunk/test/org/apache/catalina/connector/TesterResponse.java
(original)
+++ tomcat/trunk/test/org/apache/catalina/connector/TesterResponse.java Mon Apr
27 20:13:05 2015
@@ -60,4 +60,12 @@ public class TesterResponse extends Resp
// There is no buffer created for this test object since no test
depends
// on one being present or on this method suspending it.
}
+
+ @Override
+ public void reset() {
+ // Minimal implementation for tests that avoids using OutputBuffer
+ if (super.getCoyoteResponse() != null) {
+ super.getCoyoteResponse().reset();
+ }
+ }
}
Modified: tomcat/trunk/test/org/apache/catalina/filters/TestRemoteIpFilter.java
URL:
http://svn.apache.org/viewvc/tomcat/trunk/test/org/apache/catalina/filters/TestRemoteIpFilter.java?rev=1676364&r1=1676363&r2=1676364&view=diff
==============================================================================
--- tomcat/trunk/test/org/apache/catalina/filters/TestRemoteIpFilter.java
(original)
+++ tomcat/trunk/test/org/apache/catalina/filters/TestRemoteIpFilter.java Mon
Apr 27 20:13:05 2015
@@ -49,7 +49,8 @@ import org.apache.catalina.Context;
import org.apache.catalina.LifecycleException;
import org.apache.catalina.connector.Connector;
import org.apache.catalina.connector.Request;
-import org.apache.catalina.connector.Response;
+import org.apache.catalina.connector.TesterResponse;
+import org.apache.catalina.core.TesterContext;
import org.apache.catalina.startup.Tomcat;
import org.apache.catalina.startup.TomcatBaseTest;
import org.apache.tomcat.util.descriptor.web.FilterDef;
@@ -59,19 +60,25 @@ public class TestRemoteIpFilter extends
/**
* Mock {@link FilterChain} to keep a handle on the passed
- * {@link ServletRequest}.
+ * {@link ServletRequest} and (@link ServletResponse}.
*/
public static class MockFilterChain implements FilterChain {
private HttpServletRequest request;
+ private HttpServletResponse response;
@Override
public void doFilter(ServletRequest request, ServletResponse response)
throws IOException, ServletException {
this.request = (HttpServletRequest) request;
+ this.response = (HttpServletResponse) response;
}
public HttpServletRequest getRequest() {
return request;
}
+
+ public HttpServletResponse getResponse() {
+ return response;
+ }
}
public static class MockHttpServlet extends HttpServlet {
@@ -134,6 +141,20 @@ public class TestRemoteIpFilter extends
public Object getAttribute(String name) {
return getCoyoteRequest().getAttributes().get(name);
}
+
+ @Override
+ public String getServerName() {
+ return "localhost";
+ }
+
+ @Override
+ public Context getContext() {
+ // Lazt init
+ if (super.getContext() == null) {
+ getMappingData().context = new TesterContext();
+ }
+ return super.getContext();
+ }
}
public static final String TEMP_DIR = System.getProperty("java.io.tmpdir");
@@ -184,7 +205,7 @@ public class TestRemoteIpFilter extends
request.setHeader("x-forwarded-proto", "http");
// TEST
- HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request);
+ HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request).getRequest();
// VERIFY
boolean actualSecure = actualRequest.isSecure();
@@ -217,7 +238,7 @@ public class TestRemoteIpFilter extends
request.setHeader("x-forwarded-proto", "http");
// TEST
- HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request);
+ HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request).getRequest();
// VERIFY
boolean actualSecure = actualRequest.isSecure();
@@ -248,7 +269,7 @@ public class TestRemoteIpFilter extends
request.setRemoteHost("remote-host-original-value");
// TEST
- HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request);
+ HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request).getRequest();
// VERIFY
String actualXForwardedFor = request.getHeader("x-forwarded-for");
@@ -262,7 +283,6 @@ public class TestRemoteIpFilter extends
String actualRemoteHost = actualRequest.getRemoteHost();
assertEquals("remoteHost", "remote-host-original-value",
actualRemoteHost);
-
}
@Test
@@ -281,7 +301,7 @@ public class TestRemoteIpFilter extends
request.addHeader("x-forwarded-for", "140.211.11.130, 192.168.0.10,
192.168.0.11");
// TEST
- HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request);
+ HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request).getRequest();
// VERIFY
String actualXForwardedFor =
actualRequest.getHeader("x-forwarded-for");
@@ -316,7 +336,7 @@ public class TestRemoteIpFilter extends
request.setHeader("x-forwarded-for", "140.211.11.130, proxy1, proxy2");
// TEST
- HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request);
+ HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request).getRequest();
// VERIFY
String actualXForwardedFor =
actualRequest.getHeader("x-forwarded-for");
@@ -350,7 +370,7 @@ public class TestRemoteIpFilter extends
request.addHeader("x-forwarded-for", "proxy2");
// TEST
- HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request);
+ HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request).getRequest();
// VERIFY
String actualXForwardedFor =
actualRequest.getHeader("x-forwarded-for");
@@ -383,7 +403,7 @@ public class TestRemoteIpFilter extends
request.setHeader("x-forwarded-for", "140.211.11.130, proxy1, proxy2,
192.168.0.10, 192.168.0.11");
// TEST
- HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request);
+ HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request).getRequest();
// VERIFY
String actualXForwardedFor =
actualRequest.getHeader("x-forwarded-for");
@@ -415,7 +435,7 @@ public class TestRemoteIpFilter extends
request.setHeader("x-forwarded-for", "140.211.11.130, proxy1, proxy2");
// TEST
- HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request);
+ HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request).getRequest();
// VERIFY
String actualXForwardedFor =
actualRequest.getHeader("x-forwarded-for");
@@ -447,7 +467,7 @@ public class TestRemoteIpFilter extends
request.setHeader("x-forwarded-for", "140.211.11.130, proxy1,
untrusted-proxy, proxy2");
// TEST
- HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request);
+ HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request).getRequest();
// VERIFY
String actualXForwardedFor =
actualRequest.getHeader("x-forwarded-for");
@@ -483,8 +503,8 @@ public class TestRemoteIpFilter extends
}
}
- private HttpServletRequest testRemoteIpFilter(FilterDef filterDef, Request
request) throws LifecycleException, IOException,
- ServletException {
+ private MockFilterChain testRemoteIpFilter(FilterDef filterDef, Request
request)
+ throws LifecycleException, IOException, ServletException {
Tomcat tomcat = getTomcatInstance();
Context root = tomcat.addContext("", TEMP_DIR);
@@ -504,8 +524,10 @@ public class TestRemoteIpFilter extends
MockFilterChain filterChain = new MockFilterChain();
// TEST
- remoteIpFilter.doFilter(request, new Response(), filterChain);
- return filterChain.getRequest();
+ TesterResponse response = new TesterResponse();
+ response.setRequest(request);
+ remoteIpFilter.doFilter(request, response, filterChain);
+ return filterChain;
}
@Test
@@ -522,8 +544,7 @@ public class TestRemoteIpFilter extends
request.setHeader("x-forwarded-proto", "http");
// TEST
- HttpServletRequest actualRequest =
- testRemoteIpFilter(filterDef, request);
+ HttpServletRequest actualRequest = testRemoteIpFilter(filterDef,
request).getRequest();
// VERIFY
Assert.assertEquals("org.apache.catalina.AccessLog.ServerPort",
@@ -581,7 +602,6 @@ public class TestRemoteIpFilter extends
httpURLConnection.addRequestProperty("x-forwarded-proto", "https");
// VALIDATE
-
Assert.assertEquals(HttpURLConnection.HTTP_OK,
httpURLConnection.getResponseCode());
HttpServletRequest request = mockServlet.getRequest();
Assert.assertNotNull(request);
@@ -594,6 +614,98 @@ public class TestRemoteIpFilter extends
Assert.assertTrue(request.isSecure());
Assert.assertEquals("https", request.getScheme());
Assert.assertEquals(443, request.getServerPort());
+ }
+
+
+ @Test
+ public void testSendRedirectWithXForwardedProto01() throws Exception {
+ doTestSendRedirectWithXForwardedProtol(false, false, 8080, 8080);
+ }
+
+
+ @Test
+ public void testSendRedirectWithXForwardedProto02() throws Exception {
+ doTestSendRedirectWithXForwardedProtol(false, true, 8080, 8080);
+ }
+
+
+ @Test
+ public void testSendRedirectWithXForwardedProto03() throws Exception {
+ doTestSendRedirectWithXForwardedProtol(true, false, 8080, 8080);
+ }
+
+
+ @Test
+ public void testSendRedirectWithXForwardedProto04() throws Exception {
+ doTestSendRedirectWithXForwardedProtol(true, true, 8080, 8080);
+ }
+
+
+ @Test
+ public void testSendRedirectWithXForwardedProto05() throws Exception {
+ doTestSendRedirectWithXForwardedProtol(false, false, 8080, 80);
+ }
+
+ @Test
+ public void testSendRedirectWithXForwardedProto06() throws Exception {
+ doTestSendRedirectWithXForwardedProtol(false, false, 80, 8080);
+ }
+
+
+ @Test
+ public void testSendRedirectWithXForwardedProto07() throws Exception {
+ doTestSendRedirectWithXForwardedProtol(false, true, 8443, 443);
+ }
+
+
+ @Test
+ public void testSendRedirectWithXForwardedProto08() throws Exception {
+ doTestSendRedirectWithXForwardedProtol(false, true, 443, 8443);
+ }
+
+
+ private void doTestSendRedirectWithXForwardedProtol(boolean
incomingIsHttps,
+ boolean headerIsHttps, int incomingPort, int headerPort) throws
Exception {
+
+ // PREPARE
+ FilterDef filterDef = new FilterDef();
+ filterDef.addInitParameter("protocolHeader", "x-forwarded-proto");
+ filterDef.addInitParameter("remoteIpHeader", "x-my-forwarded-for");
+ if (headerIsHttps) {
+ filterDef.addInitParameter("httpsServerPort",
Integer.toString(headerPort));
+ } else {
+ filterDef.addInitParameter("httpServerPort",
Integer.toString(headerPort));
+ }
+
+ MockHttpServletRequest request = new MockHttpServletRequest();
+ request.setRemoteAddr("192.168.0.10");
+ request.setServerPort(incomingPort);
+ request.setSecure(true);
+ if (incomingIsHttps) {
+ request.setScheme("https");
+ } else {
+ request.setScheme("http");
+ }
+ request.setHeader("x-my-forwarded-for", "140.211.11.130");
+ if (headerIsHttps) {
+ request.setHeader("x-forwarded-proto", "https");
+ } else {
+ request.setHeader("x-forwarded-proto", "http");
+ }
+
+ // TEST
+ HttpServletResponse actualResponse = testRemoteIpFilter(filterDef,
request).getResponse();
+ actualResponse.sendRedirect("/");
+ String location = actualResponse.getHeader("Location");
+
+ // VERIFY
+ Assert.assertEquals(location,
+ Boolean.valueOf(location.startsWith("https")),
Boolean.valueOf(headerIsHttps));
+ if (headerPort == 80 && !headerIsHttps || headerPort == 443 &&
headerIsHttps) {
+ Assert.assertTrue(location, location.contains("://localhost/"));
+ } else {
+ Assert.assertTrue(location, location.contains("://localhost:" +
headerPort + "/"));
+ }
}
}
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]